A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
Bigger, more diverse networks mean a larger attack surface for hackers. Today's networking pros must update security strategies to account for new vulnerabilities and respond to inevitable attacks. But first, they need a clear view into their network.
An infosec consultancy has claimed that a Heartbleed exploit was used by attackers to gain access as part of the Community Health data breach.
Is it true that if you don't use it, you lose it? When it comes to the cloud, enterprises are buying excess capacity at lower prices. David Linthicum discusses whether the extra cloud capacity is being maximized.
OpenStack is close to doing its victory lap in the private cloud race -- but not so fast. There are three emerging trends in the cloud market that could become threats to OpenStack's position.
Combining the Internet of Things and cloud services could build an IT superpower. With its infinite capabilities and security enhancements, it'd be hard to find its kryptonite.
Enterprises moving to public cloud often seek the help of an experienced integration partner. But with more than 1,000 choices to filter through, do you know what to look for in an AWS partner?
David Linthicum reviews the tricks of the trade for AWS Auto Scaling that anyone building for scale in Amazon Web Services' public cloud platform should consider.
Amazon WorkSpaces alleviates much of the management headache and overhead of traditional desktops, but there are still five management tasks cloud admins need to handle.
Read one expert's view on the future of PaaS, its current uses and relevant security considerations. With different versions of PaaS making names for themselves, some IT professionals are left wondering if there is still value in the parent model.
With so many "as a service" cloud products, it can be difficult to understand what they do. Chris Moyer breaks down the difference between PaaS and SaaS in this Ask the Expert answer.
Frustrated with the performance of their Y2K-era human resources management systems, organizations are looking to the cloud for 21st-century functionality.
Generation 1 and Generation 2 virtual machines are the two options for Windows Server 2012 R2. Generation 2 offers plenty of benefits but there are requirements and limitations that accompany it.
Before you deploy a bare-metal hypervisor, you have to make sure you have met all of the requirements. One of the main requirements needed to make the deployment work is something not included in SCVMM.
Hyper-V Replica is included in Hyper-V 3.0 without any extra cost, but what do you need to use it? When is the right time to host your applications in Hyper-V Replica? These questions and more are answered right here.
Cisco and VMware offer competing products to bring virtualization to the networking world, and each has a different way to implement the technology.
Using a network virtualization product such as VMware NSX can help administrators who want to be sure data won't leak from VMs.
VMware's network virtualization offering promises to speed up tasks that traditionally have slowed an enterprise from responding to immediate needs.
Over 60% of organisations are unable to adopt a BYOD policy due to business risk and compliance rules, according to research
The Borough of Poole has been using Huddle to enable local government teams to collaborate securely on issues of child welfare
The National Employment Savings Trust has enrolled more than one million people to its administration system